Search Results for author: Xinyue Shen

Found 8 papers, 4 papers with code

"Do Anything Now": Characterizing and Evaluating In-The-Wild Jailbreak Prompts on Large Language Models

1 code implementation7 Aug 2023 Xinyue Shen, Zeyuan Chen, Michael Backes, Yun Shen, Yang Zhang

The misuse of large language models (LLMs) has garnered significant attention from the general public and LLM vendors.

Community Detection

Unsafe Diffusion: On the Generation of Unsafe Images and Hateful Memes From Text-To-Image Models

1 code implementation23 May 2023 Yiting Qu, Xinyue Shen, Xinlei He, Michael Backes, Savvas Zannettou, Yang Zhang

Our evaluation result shows that 24% of the generated images using DreamBooth are hateful meme variants that present the features of the original hateful meme and the target individual/community; these generated images are comparable to hateful meme variants collected from the real world.

In ChatGPT We Trust? Measuring and Characterizing the Reliability of ChatGPT

no code implementations18 Apr 2023 Xinyue Shen, Zeyuan Chen, Michael Backes, Yang Zhang

In this paper, we perform the first large-scale measurement of ChatGPT's reliability in the generic QA scenario with a carefully curated set of 5, 695 questions across ten datasets and eight domains.

Question Answering

MGTBench: Benchmarking Machine-Generated Text Detection

1 code implementation26 Mar 2023 Xinlei He, Xinyue Shen, Zeyuan Chen, Michael Backes, Yang Zhang

Nonetheless, we note that only a small fraction of adversarial-crafted perturbations on MGTs can evade the ChatGPT Detector, thus highlighting the need for more robust MGT detection methods.

Benchmarking Question Answering +4

Prompt Stealing Attacks Against Text-to-Image Generation Models

no code implementations20 Feb 2023 Xinyue Shen, Yiting Qu, Michael Backes, Yang Zhang

In this paper, we propose a novel attack, namely prompt stealing attack, which aims to steal prompts from generated images by text-to-image generation models.

Backdoor Attacks in the Supply Chain of Masked Image Modeling

no code implementations4 Oct 2022 Xinyue Shen, Xinlei He, Zheng Li, Yun Shen, Michael Backes, Yang Zhang

Different from previous work, we are the first to systematically threat modeling on SSL in every phase of the model supply chain, i. e., pre-training, release, and downstream phases.

Contrastive Learning Self-Supervised Learning

Nonconvex Sparse Logistic Regression with Weakly Convex Regularization

no code implementations7 Aug 2017 Xinyue Shen, Yuantao Gu

In this work we propose to fit a sparse logistic regression model by a weakly convex regularized nonconvex optimization problem.

regression

Disciplined Multi-Convex Programming

3 code implementations12 Sep 2016 Xinyue Shen, Steven Diamond, Madeleine Udell, Yuantao Gu, Stephen Boyd

A multi-convex optimization problem is one in which the variables can be partitioned into sets over which the problem is convex when the other variables are fixed.

Optimization and Control

Cannot find the paper you are looking for? You can Submit a new open access paper.